{"title":"Design and fabrication of window shaped fractal antenna for RFID","authors":"R. Verma, Deepika, R. L. Yadava","doi":"10.1109/ICRITO.2016.7784926","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784926","url":null,"abstract":"This paper describes the window shaped fractal antenna and uses it as application in RFID by reducing the size of an antenna along the use of fractals technique. The proposed antenna possess the properties of miniaturizations by 15.1% in second iteration of window shaped based antenna. The FR4_epoxy uses as the substrate with height of 1.6mm. The proposed antenna has been fabricated and tested on analyzer, the outcome result comparison with simulated result, have found the similar characteristics. The return Loss (S11) <; -10dB of the proposed antenna at second iteration found frequencies of 2.25 GHz, 3.5GHz and 5.3GHz.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132198239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bucket based data deduplication technique for big data storage system","authors":"N. Kumar, R. Rawat, S. C. Jain","doi":"10.1109/ICRITO.2016.7784963","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784963","url":null,"abstract":"In this paper proposed bucket based data deduplication technique is presented. In proposed technique bigdata stream is given to the fixed size chunking algorithm to create fixed size chunks. When the chunks are obtained then these chunks are given to the MD5 algorithm module to generate hash values for the chunks. After that MapReduce model is applied to find whether hash values are duplicate or not. To detect the duplicate hash values MapReduce model compared these hash values with already stored hash values in bucket storage. If these hash values are already present in the bucket storage then these can be identified as duplicate. If the hash values are duplicated then do not store the data into the Hadoop Distributed File System (HDFS) else then store the data into the HDFS. The proposed technique is analyzed using real data set using Hadoop tool.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133084954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs","authors":"Pradeep R. Dumne, Arati Manjaramkar","doi":"10.1109/ICRITO.2016.7785004","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785004","url":null,"abstract":"In MANET, node changes its location so it adopt property like infrastructure-less. A group of mobile nodes which are agree and capable to establish relations, using without any fixed centralize supervision and infrastructure of the network is known as mobile ad hoc network. To start communications among the mobile nodes, they should be available to each other. But presence of malicious nodes, might fail this requirement and interrupt integrity, confidentiality, availability of network services such as routing processes. So prevention and detection of malicious nodes is a major task. In this paper, we proposed a method to resolve this problem by using malicious node detection schema based upon DSR mechanism-cooperative bait detection scheme (CBDS) which uses hybrid defense architectures. CBDS technique helps to find out malicious node by using a reverse tracing technique. The basic and proposed CBDS schemes are implemented in NS-2.35. Results are examined on the basis of throughput, PDR.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125225862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An epileptic sensor network over high speed networks","authors":"Mohammad Siraj, S. Umair","doi":"10.1109/ICRITO.2016.7785030","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785030","url":null,"abstract":"It has been always a challenging task for the researchers to incorporate information technology advancements in the medical profession. Epilepsy is a neurological disorder which is rampant in 1% of the world population. Epilepsy is a recurrent dysfunctional activity of the brain. An epileptic seizure can occur in epilepsy patients at any time, which can cause physical injury to the patient and may even lead to the patient's death. It is a challenging task for the researchers to infer a pre seizure epilepsy attack. Human-machine interaction is a step towards achieving this goal, but current therapies do not provide a full proof mechanism for real time seizure detection. Present day networks provide an excellent mechanism for the transfer of audio and video at a blazing speed. In this work, we have presented a novel concept of providing an interface between the epileptic patient sensor nodes and the smart phones. The motive behind developing this interface is to sense early and accurately a seizure triggering, create an alarm system for the patient and his doctors and relatives whenever and wherever required, so that through this alarm system no physical injury occurs to the patient.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure communication and authentication using Raspberry Pi","authors":"Vidur Kakar","doi":"10.1109/ICRITO.2016.7785011","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785011","url":null,"abstract":"Secure communication and authentication are two very important factors when it comes to applications such as payments. Since payments involve critical information such as user account number, pin, balance, etc., it becomes very vulnerable to fraudulent elements that want to gain access to this information illegally. Thus, this hardware and algorithm aims at creating a mobile payment terminal through which transactions can be carried out securely using the Transport Layer Security (TLS) protocol through a Raspberry Pi module.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ritu Gupta, P. Mundra, Shikha Karwal, Abhilasha Singh
{"title":"DWT-SVD based watermarking scheme of JPEG images using elliptic curve cryptography","authors":"Ritu Gupta, P. Mundra, Shikha Karwal, Abhilasha Singh","doi":"10.1109/ICRITO.2016.7784981","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784981","url":null,"abstract":"The image watermarking technology is a vital facet about multimedia authentication and copyright protection to improve its reliability and security. This paper proposes an embedment of encrypted watermark in a JPEG image to address the issues of proprietorship of digital images. Amongst the cryptographic solutions, the most satisfactory cryptography method is Elliptic Curve Cryptography because of its small usage of bandwidth, low computational time and small key size. DWT and SVD are used as a scientific means to implant watermark in the image. The quality of watermarked image is measured by Peak signal to noise ratio (PSNR) and to compare the recovered watermark and the original watermark Normalized correlation (NC) is used.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123961896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Klochkov, A. Gazizulina, M. Ostapenko, Elena Eskina, N. Vlasova
{"title":"Classifiers of nonconformities in norms and requirements","authors":"Y. Klochkov, A. Gazizulina, M. Ostapenko, Elena Eskina, N. Vlasova","doi":"10.1109/ICRITO.2016.7784933","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784933","url":null,"abstract":"The paper analyses nonconformities in norms, requirements and regulations, which demonstrates that standardization is a crucial factor for quality assurance. It is pointed out that the absence of risk level analysis for each nonconformity is an important drawback of a modern classification.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"7 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131638047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twitter sentiment analysis using various classification algorithms","authors":"Ajay Deshwal, S. Sharma","doi":"10.1109/ICRITO.2016.7784960","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784960","url":null,"abstract":"Twitter is a web application built to find out what is happening at any instance through its micro blogging feature, anywhere in the world. Twitter posts are generally short and generated constantly by public and very well-suited for opinion mining. These messages can be classified as containing either positive or a negative sentiment on the basis of certain aspects with respect to a term based query. The past studies of sentiment classification are not very conclusive about which features and supervised classification algorithms are good for designing accurate and efficient sentiment classification system. We propose to combine many feature extraction techniques like emoticons, exclamation and question mark symbol, word gazetteer, unigrams to design more accurate sentiment classification system. This paper presents empirical comparison of six supervised classification algorithms.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130326007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of routing protocols under different types of attacks in MANETs","authors":"Lakshit Prashar, Raj Kamal Kapur","doi":"10.1109/ICRITO.2016.7784989","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784989","url":null,"abstract":"MANETs are self-configuring, self-healing, and self-optimized network of devices which are mobile in nature connected by a wireless medium. All mobile nodes in “MANET” are mobile and therefore the nodes change their links with other devices very frequently. Some receiving nodes in the network maybe moved out-of-range of the sender node, therefore the data packets hops through intermediate nodes. The nodes in MANETs thus behave as router as well as end-devices. MANET network can be connected within itself or tothe Internet also. MANETs are infrastructure-less and hence are very vulnerable to attacks. Through this paper, we've presented the study and comparative analysis of different Routing Protocols under attacks.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A planer 2G/3G/LTE/WWAN/WiMAX antenna for tablet computer","authors":"A. Singh, Ankit Agarwal, Neha Jain","doi":"10.1109/ICRITO.2016.7785001","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785001","url":null,"abstract":"A planer antenna is developed for metallic framed tablet computer for various applications. The open slot dual antenna system for the 2G/ 3G/ LTE/ WWAN/ WiMAX bands is presented. The proposed antenna system can fit inside the tablet in such a manner that the display screen is above this antenna and the metallic frame of the tablet computer is below this antenna as a ground plane. The antenna composed of filter circuits for different bands of the antenna with the two feeds. The parametric analysis is done for filter circuits, ground slot width and tuning stubs to obtain impedance matching for different resonant modes of required bandwidth. The antenna achieves frequency range 810-895, 1700-2790, 3300-3610, 5500-6040 MHz bands. Reflection coefficient (S11 and S22) and effect of Filter parameter are discussed for the proposed design.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"540 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123462370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}